{"id":6188,"date":"2023-08-16T11:20:36","date_gmt":"2023-08-16T16:20:36","guid":{"rendered":"https:\/\/cmitsolutions.com\/florence-ky-1041\/?p=6188"},"modified":"2023-08-16T11:20:36","modified_gmt":"2023-08-16T16:20:36","slug":"safeguarding-sensitive-data-using-it-support","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/florence-ky-1041\/blog\/safeguarding-sensitive-data-using-it-support\/","title":{"rendered":"Safeguarding Sensitive Data Using IT Support"},"content":{"rendered":"<p><span data-contrast=\"auto\">Meet John, a lawyer who pursued his dream of owning his own law firm. John specializes in personal injury cases, and as the firm grows, John is finding it difficult to manage a lot of private client data. This includes various types of sensitive information, including social security numbers, personal information, and medical or financial records.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In order to maintain the desired growth, John needs to consider IT support providers who can offer cybersecurity solutions. This way, John can work confidently, knowing he is doing everything he can to keep his clients&#8217; data safe.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559739&quot;:225}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/it-services\/cybersecurity\/\"><span data-contrast=\"none\">John needs CMIT Solutions to offer data risk management.<\/span><\/a><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559739&quot;:225}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">The Challenge: Data Breach Vulnerability<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:225}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">John&#8217;s law firm heavily relies on digital documentation and communication for its day-to-day operations. In order to efficiently serve their clients, the firm has implemented a system where multiple employees can work remotely and access sensitive data from various devices. However, this convenience comes with a significant risk &#8211; the looming threat of a data breach.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">John is acutely aware of the potential consequences of a security breach. Not only could it compromise the confidentiality of his clients&#8217; infor<\/span><\/p>\n<p><img decoding=\"async\" class=\"size-medium wp-image-6189 alignleft\" src=\"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/data-breach-300x300.png\" alt=\"Remote workers discussing data and client files\" width=\"300\" height=\"300\" srcset=\"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/data-breach-300x300.png 300w, https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/data-breach-1024x1024.png 1024w, https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/data-breach-150x150.png 150w, https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/data-breach-768x768.png 768w, https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/data-breach.png 1080w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span data-contrast=\"auto\">mation, but it could also have severe repercussions for his firm&#8217;s reputation. The legal profession places a high value on trust and confidentiality, and any breach of this trust could lead to a loss of clients and damage the firm&#8217;s standing in the industry.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">The Solution: Cybersecurity Applications<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:225}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Recognizing the urgency of the situation, John seeks the assistance of a reputable IT support provider, <\/span><a href=\"https:\/\/cmitsolutions.com\/it-services\/cybersecurity\/\"><span data-contrast=\"none\">CMIT Solutions <\/span><\/a><span data-contrast=\"auto\">. The IT experts offer a comprehensive data protection strategy tailored to his law firm&#8217;s needs:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Endpoint Protection:<\/span><\/b><span data-contrast=\"auto\"> The IT support team deploys robust endpoint security applications across all devices used by John and his team. These applications detect and prevent malware, phishing attempts, and unauthorized access.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Multi-Factor Authentication (MFA):<\/span><\/b><span data-contrast=\"auto\"> To enhance data security, the IT experts implement MFA for accessing sensitive systems and data. This adds an extra layer of protection, ensuring that only authorized individuals can access critical information.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Secure Communication Tools:<\/span><\/b><span data-contrast=\"auto\"> The IT support team recommends and sets up encrypted communication tools, allowing the firms to exchange sensitive information securely, even when working remotely.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Regular Security Audits:<\/span><\/b><span data-contrast=\"auto\"> The IT support provider conducts regular security audits to identify vulnerabilities and potential entry points for cyberattacks. This proactive approach helps prevent security breaches before they occur.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><b><span data-contrast=\"auto\">The Results: Data Protection and Peace of Mind<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559738&quot;:225,&quot;335559739&quot;:225}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With the cybersecurity applications in place, John experiences a transformation in his law firm&#8217;s operations:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Client Confidence:<\/span><\/b><span data-contrast=\"auto\"> The enhanced cyber security measures reassure clients that their confidential information is in safe hands, strengthening trust and loyalty.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Legal Compliance:<\/span><\/b><span data-contrast=\"auto\"> The law firm remains compliant with industry-specific regulations governing the protection of sensitive client data.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Reputation Preservation:<\/span><\/b><span data-contrast=\"auto\"> The robust security solutions measures protect the firm&#8217;s reputation, preventing potential data breaches from making headlines.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Efficiency: <\/span><\/b><span data-contrast=\"auto\">Employees can work confidently, knowing that their interactions with client data are secure. Remote work becomes streamlined and worry-free.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">John&#8217;s law firm thrives as it leverages cybersecurity applications to protect classified information. With data safeguarded and vulnerabilities minimized, the firm can focus on delivering exceptional legal services without compromising on security.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">The Solution: Cybersecurity Applications<\/span><\/b><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:225}\"> <img decoding=\"async\" class=\"size-medium wp-image-6190 alignright\" src=\"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/1-300x300.png\" alt=\"Woman shocked looking at computer screen after data breach\" width=\"300\" height=\"300\" srcset=\"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/1-300x300.png 300w, https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/1-1024x1024.png 1024w, https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/1-150x150.png 150w, https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/1-768x768.png 768w, https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-content\/uploads\/sites\/43\/2023\/08\/1.png 1080w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/p>\n<p><span data-contrast=\"auto\">Recognizing the urgency of the situation, John seeks the assistance of a reputable IT support provider, <\/span><a href=\"https:\/\/cmitsolutions.com\/it-services\/cybersecurity\/\"><span data-contrast=\"none\">CMIT Solutions <\/span><\/a><span data-contrast=\"auto\">. The IT experts offer a comprehensive data protection strategy tailored to his law firm&#8217;s needs:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Endpoint Protection:<\/span><\/b><span data-contrast=\"auto\"> The IT support team deploys robust endpoint security applications across all devices used by John and his team. These applications detect and prevent malware, phishing attempts, and unauthorized access.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Multi-Factor Authentication (MFA):<\/span><\/b><span data-contrast=\"auto\"> To enhance data security, the IT experts implement MFA for accessing sensitive systems and data. This adds an extra layer of protection, ensuring that only authorized individuals can access critical information.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Secure Communication Tools:<\/span><\/b><span data-contrast=\"auto\"> The IT support team recommends and sets up encrypted communication tools, allowing the firms to exchange sensitive information securely, even when working remotely.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Regular Security Audits:<\/span><\/b><span data-contrast=\"auto\"> The IT support provider conducts regular security audits to identify vulnerabilities and potential entry points for cyberattacks. This proactive approach helps prevent security breaches before they occur.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><b><span data-contrast=\"auto\">The Results: Data Protection and Peace of Mind<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559738&quot;:225,&quot;335559739&quot;:225}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With the cybersecurity applications in place, John experiences a transformation in his law firm&#8217;s operations:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Client Confidence:<\/span><\/b><span data-contrast=\"auto\"> The enhanced cyber security measures reassure clients that their confidential information is in safe hands, strengthening trust and loyalty.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Legal Compliance:<\/span><\/b><span data-contrast=\"auto\"> The law firm remains compliant with industry-specific regulations governing the protection of sensitive client data.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Reputation Preservation:<\/span><\/b><span data-contrast=\"auto\"> The robust security solutions measures protect the firm&#8217;s reputation, preventing potential data breaches from making headlines.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551500&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:600,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Efficiency: <\/span><\/b><span data-contrast=\"auto\">Employees can work confidently, knowing that their interactions with client data are secure. Remote work becomes streamlined and worry-free.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">John&#8217;s law firm thrives as it leverages cybersecurity applications to protect classified information. With data safeguarded and vulnerabilities minimized, the firm can focus on delivering exceptional legal services without compromising on security.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meet John, a lawyer who pursued his dream of owning his own&#8230;<\/p>\n","protected":false},"author":82,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6188","post","type-post","status-publish","format-standard","hentry","category-local-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/posts\/6188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/comments?post=6188"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/posts\/6188\/revisions"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/media?parent=6188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/categories?post=6188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/tags?post=6188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}